Internet Term Guidehttp://webarchive.me/geocities/SiliconValley/5598/talk.html
gain illegal access to computers. They are usually malicious in their intentions. Cyberspace The "world of computers and the society that gathers around them," as referr
Hobbes' Internet Timeline - the definitive ARPAnet & Internet historyhttps://www.zakon.org/robert/internet/timeline/
network of time-sharing computers" TX-2 at MIT Lincoln Lab and AN/FSQ-32 at System Development Corporation (Santa Monica, CA) are directly linked (without packet switches) via a d
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'
Links 29/4/2020: TDE 10th Anniversary, Sailfish OS 3.3http://techrights.org/o/2020/04/29/tde-10th-anniversary/
– Learning about Computers for Kids – Week 27 This is a weekly blog about the Raspberry Pi 4 (“RPI4”), the latest product in the popular Raspberry Pi range of computers. With so m
Links for the day
The WWW VL: Educational Technology - Educational VR (MUD) sub-page (05-Jan-2000)https://tecfa.unige.ch/edu-comp/WWW-VL/eduVR-page.html
Network, is a system of computers in the domain musenet.org providing access to Educational MUSEs (Multi-User Simulated Environments), such as MicroMUSE and MariMUSE. It is based
Linux Security Hardening and Other Tweakshttps://vez.mrsk.me/linux-hardening
As the clocks on most computers have a tendency to drift over time, it's a good idea to run some kind of NTP client. There are a variety of options available. The base Arch instal
A collection of kernel and userland settings one can change to improve the security and usability of a Linux system. Targeted at Arch, but should work for other distros too.
portal.goeshard.orghttps://portal.goeshard.org/
from Dann's old computers with pop culture blogging reminiscent of X-Entertainment. Dann has some very old sites that are still up too. e/n : https://dannarchy.com/en movies
Windows XP Guidehttp://www.prints.pink/unlisted/windowsxp.html
(or using two separate computers, if you prefer). You might also want to look into the One Core API for Windows XP, although I won't be discussing it here as I know nothing about
The Power of Centralizationhttps://secushare.org/centralization
than that, almost all computers share the problem of "downstream abuse", so the only ultimate way to protect something from your friends is to not share it online. Top
~hlhttps://www.devever.net/~hl/
20221029 computing Computers are an inherently oppressive technology 20220612 computing The Demise of the Mildly Dynamic Website 20220502 computing Website redesign and editorial
Vulonkaaz's linkshttps://vulonkaaz.zip/links.html
be useful for school computers or whatever) Eaglercraft : Minecraft Java ported to web browser, lower performance than native java of course but it's crazy it even works, even hav
DX LISTENING DIGEST AUGUST 2003 ARCHIVEhttp://www.w4uvh.net/dxldtd3h.html
such as the number of computers in the two Koreas. Many South Koreans are unaware of the program. But for decades, North Korea has considered it a propaganda tool aimed at destabi
NLnet; All projectshttps://nlnet.nl/project/index.html
ARM-based single board computers ARMify NGI0 Entrust 2023 2025 Auto-Identification of MCU Models to Simplify ARM Bare-Metal Reverse Engineering ARPA2 2017 Working towards a decent
Find more...